This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library. https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783 https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83 https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
Created dotnet6.0 tracking bugs for this issue: Affects: fedora-all [bug 2174281] Created golang-entgo-ent tracking bugs for this issue: Affects: fedora-all [bug 2174282] Created nodejs tracking bugs for this issue: Affects: fedora-all [bug 2174283] Created nodejs-nodemon tracking bugs for this issue: Affects: fedora-all [bug 2174284] Created nodejs:13/nodejs tracking bugs for this issue: Affects: epel-all [bug 2174279] Created nodejs:14/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2174285] Created nodejs:16-epel/nodejs tracking bugs for this issue: Affects: epel-all [bug 2174280] Created nodejs:16/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2174286] Created nodejs:18/nodejs tracking bugs for this issue: Affects: fedora-all [bug 2174287] Created zuul tracking bugs for this issue: Affects: fedora-all [bug 2174278]
This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.7 Via RHSA-2023:1428 https://access.redhat.com/errata/RHSA-2023:1428
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2023:1533 https://access.redhat.com/errata/RHSA-2023:1533
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1582 https://access.redhat.com/errata/RHSA-2023:1582
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1583 https://access.redhat.com/errata/RHSA-2023:1583
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2023:1742 https://access.redhat.com/errata/RHSA-2023:1742
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:1743 https://access.redhat.com/errata/RHSA-2023:1743
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Via RHSA-2023:1744 https://access.redhat.com/errata/RHSA-2023:1744
This issue has been addressed in the following products: multicluster engine for Kubernetes 2.2 for RHEL 8 Via RHSA-2023:1887 https://access.redhat.com/errata/RHSA-2023:1887
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.7 for RHEL 8 Via RHSA-2023:1888 https://access.redhat.com/errata/RHSA-2023:1888
This issue has been addressed in the following products: multicluster engine for Kubernetes 2.1 for RHEL 8 Via RHSA-2023:2061 https://access.redhat.com/errata/RHSA-2023:2061
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8 Via RHSA-2023:2083 https://access.redhat.com/errata/RHSA-2023:2083
This issue has been addressed in the following products: multicluster engine for Kubernetes 2.0 for RHEL 8 Via RHSA-2023:2098 https://access.redhat.com/errata/RHSA-2023:2098
This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8 Via RHSA-2023:2104 https://access.redhat.com/errata/RHSA-2023:2104
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2654 https://access.redhat.com/errata/RHSA-2023:2654
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:2655 https://access.redhat.com/errata/RHSA-2023:2655
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-25881
This issue has been addressed in the following products: RHINT Service Registry 2.4.3 GA Via RHSA-2023:3815 https://access.redhat.com/errata/RHSA-2023:3815
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2023:5533 https://access.redhat.com/errata/RHSA-2023:5533